• Title/Summary/Keyword: Military information security

Search Result 356, Processing Time 0.025 seconds

A study on the actual precision shooting training based on virtual reality (가상현실 기반 실전적 정밀사격훈련 구현 연구)

  • Lee, Byounghwak;Kim, Jonghwan;Shin, Kyuyoung;Kim, Dongwook;Lee, Wonwoo;Kim, Namhyuk
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.62-71
    • /
    • 2018
  • The rapid growth of virtual reality technology in the era of the 4th Industrial Revolution has accelerated scientification of combat training systems in addition to ICT(information and communications technology) in military field. Recently, research and development of simulators based on virtual reality have been actively conducted in order to solve sensitive issues such as increase of civil complaints due to the noise of a shooting range, prevention of shooting accident, and reduction of training cost. In this paper, we propose two key solutions: spatial synchronization method and modified point mass trajectory model with small angle approximation to overcome technical limitations of a current training simulator. A trainee who wears a haptic vest in a mixed reality environment built in MARS(medium-range assault rifle shooting simulator) is able to conduct not only precision shooting but also two-way engagement with virtual opponents. It is possible for trainee to receive more reliable evaluations in the MARS than an existing rifle simulator based on laser.

  • PDF

A Study on the Strategic Application of National Defense Data for the Construction of Smart Forces in the 4th IR (4차 산업혁명시대 스마트 강군 건설을 위한 국방 데이터의 전략적 활용 방안연구)

  • Kim, Seyong;Kim, Junsang;Kang, Seokwon
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.113-123
    • /
    • 2020
  • The fourth industrial revolution can be called the hyper-connected-based intelligent revolution triggered by advanced information technology and intelligent technology, and the basis for implementing these technologies is 'data'. This study proposes a way to strategically use data in order to lead this intelligent revolution in the defense area. First of all, implications through analysis of domestic and international trends and prior research and current status of defense data management were analyzed, and four directions for development were presented. If the government composes conditions for building, releasing, sharing, distribution, and convergence of defense data considering the environment of national defense in the future, it is expected that it will serve as a foundation and a shortcut to be a digitalized strong military through smart defense innovation in the era of the fourth industrial revolution.

Comparative Study of US-China Discourse on Cross-border Data Regulation and Cybersecurity: Focusing on ASEAN Development Assistance Cases (미·중 초국경 데이터 규제와 사이버안보 담론 비교: 아세안 개발원조 사례를 중심으로)

  • Kayeon Lee
    • Informatization Policy
    • /
    • v.30 no.1
    • /
    • pp.89-108
    • /
    • 2023
  • Science, technology and innovation (STI) has expanded the activity of actors from the traditional physical territory to the cyberspace. Data-driven platform services and markets advance new discussions on cross-border cooperation and cyber security, as well as discourse on sovereignty in cyberspace. These changes are also affecting the hegemony competition between the US and China. In particular, competition for aid to developing countries that are located along major resource transportation routes, such as natural gas and deep sea resources, is fierce. ASEAN is not only a geopolitical military and security point where the US and China powers collide, but its population of 600 million has great potential for the development of the digital economy due to its data resources. In this regard, this article aims to connect the discourse of liberalism and authoritarianism with data regulation and cybersecurity in international development cooperation, and derive implications for ASEAN integration through this. This study has significance as a convergence study that links international political issues related to big data in terms of global governance.

A Study on The Cyber Threat Centered Defense Cyber Protection Level Analysis (사이버 위협 중심의 국방 사이버 방호수준 분석에 관한 연구)

  • Seho Choi;Haengrok Oh;Joobeom Yun
    • Convergence Security Journal
    • /
    • v.21 no.4
    • /
    • pp.77-85
    • /
    • 2021
  • Cyber protection is an activity that protects the information systems we operate from cyber attacks and threats. To know the level of protection of the currently operating cyber protection system, it is necessary to update the current state of attack technology by reflecting the constantly evolving cyber threats and to analyze whether it is possible to respond with the protection function. Therefore, in this paper, we analyze the relationship between the attack procedures and defense types of the cyber kill chain with the defense technology(Mitigation ID) of MITRE and present the cyber protection level for each military unit type with a focus on defensive cyber activities. In the future, it is expected that the level of cyber protection will be improved through real-time analysis of the response capabilities of cyber protection systems operating in the defense sector to visualize the level of protection for each unit, investigate unknown cyber threats, and actively complement vulnerabilities.

A New Moving Mobile Base Station (MMBS) Scheme for Low Power RMIMS Wireless System (PARTI: MMBS general issues, clystering and signalling Procedures) (저전력 RMIMS 무선 터미널을 위한 새로운 움직이는 이동 기지국 시스템 구조 (1부 : MMBS 일반사항, 클러스터링 및 신호절차))

  • 박수열;고윤호;유상조;김성대
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.12B
    • /
    • pp.2298-2319
    • /
    • 1999
  • In this paper, we propose a new moving mobile base station (MMBS) scheme for very low power and micro-size RMIMS (radio-interfaced micro information monitoring system) terminals. RMIMS terminals can be used in various application service areas such as pollution monitoring, environment surveillance, traffic monitoring, emergency monitoring (e.g., building, bridge, railroad breakdown), security monitoring (e.g., theft, alarm) and military application. For these applications based on wireless transmission technologies, sensor type RMIMS terminals must satisfy low cost and low power design (e.g., solar power, life limited battery) requirement. In RMIMS terminal design, this low power requirement limits transmission range of uplink or reverse link and means small cell size. Also these applications using RMIMS terminals may have a little bit non real-time traffic characteristic and low scattering density in service area.

  • PDF

Anti-interference Methods using Vector-based GPS Receiver Mode

  • Viet, Hoan Nguyen;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.5
    • /
    • pp.545-557
    • /
    • 2018
  • The Global Positioning System (GPS) has become popular and widely used in many fields from military to civilian applications. However, GPS signals are suffered from interference due to its weak signal over wireless channel. There are many types of interference, such as jamming, blocking multipath, and spoofing, which can mislead the operation of GPS receiver. In this paper, vector-based tracking loop model with integrity check is proposed to detect and mitigate the harmful effect of interference on GPS receiver operation. The suggested methods are implemented in the tracking loop of GPS receiver. As a first method, integrity check with carrier-to-noise ratio (C/No) monitoring technique is applied to detect the presence of interference and prevent contaminated channels out of tracking channels to calculate position. As a second method, a vector-based tracking loop using Extended Kalman Filter with adaptive noise covariance according to C/No monitoring results. The proposed methods have been implemented on simulated dataset. The results demonstrates that the suggested methods significantly mitigate interference of Additive White Gaussian Noise (AWGN) and improve position calculation by 44%.

Development of Data Acquisition System using the Backscattered X-ray (후방산란성 엑스레이를 이용한 데이터 획득 시스템 개발)

  • Hwang, In-Ho;Jung, Jin-Seok;Yuk, Sun-Woo;Yoo, Sun-Kook
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.26 no.10
    • /
    • pp.129-133
    • /
    • 2009
  • Considerable attention has been focused on digital X-ray systems with transmission. However, only a few attempts have been made using X-ray backscatter systems. This study developed a Data Acquisition System (DAS) for backscattered X-rays. The imaging system used X-ray backscatter at low energy levels, which has unique advantages in terms of acquiring information that cannot be obtained using the transmission system. Such systems are of potential benefit in the medical, industrial, security and military fields because of its practical benefits and the low doses used. The developed system is a similar body scan system. Experiments were carried out using a several metal materials and a fish, which produces results similar to those obtained using the human body during X-ray testing.

Underwater Optical Image Data Transmission in the Presence of Turbulence and Attenuation

  • Ramavath Prasad Naik;Maaz Salman;Wan-Young Chung
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.24 no.1
    • /
    • pp.1-14
    • /
    • 2023
  • Underwater images carry information that is useful in the fields of aquaculture, underwater military security, navigation, transportation, and so on. In this research, we transmitted an underwater image through various underwater mediums in the presence of underwater turbulence and beam attenuation effects using a high-speed visible optical carrier signal. The optical beam undergoes scintillation because of the turbulence and attenuation effects; therefore, distorted images were observed at the receiver end. To understand the behavior of the communication media, we obtained the bit error rate (BER) performance of the system with respect to the average signal-to-noise ratio (SNR). Also, the structural similarity index (SSI) and peak SNR (PSNR) metrics of the received image were evaluated. Based on the received images, we employed suitable nonlinear filters to recover the distorted images and enhance them further. The BER, SSI, and PSNR metrics of the specific nonlinear filters were also evaluated and compared with the unfiltered metrics. These metrics were evaluated using the on-off keying and binary phase-shift keying modulation techniques for the 50-m and 100-m links for beam attenuation resulting from pure seawater, clear ocean water, and coastal ocean water mediums.

Security Measures against Assembly and Demonstration during International Conference - the Case of the Nuclear Security Summit - (국제회의 시 집회시위에 관한 안전관리 방안 - 핵 안보정상회의 개최를 중심으로 -)

  • Lee, Sun-Ki
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.193-222
    • /
    • 2011
  • Our country successfully hosted the G20 summit in Seoul in November, 2010. Afterwards, however, the Yeonpyungdo shelling incident took place by the North, and the North Korean nuclear issue have strained interKorean relations. Our country is going to host the nuclear security summit, which is of great significance at this point of time. The nuclear security summit is to be attended by 47 countries. The participant countries of this summit is larger in number than those of the ASEM, APEC and the G20 summit that our country has ever hosted. That is a large-scale international conference that invites the UN, the IAEA and the EU, which are three major nuclear-related international organizations. A successful hosting of the nuclear security summit will serve as an opportunity to boost our country's national prestige, and is likely be beneficial to the settlement of the North Korean nuclear issue. Like other international submits in foreign countries, however, violent anti-globalization demonstrations are expected to occur when the nuclear security summit is held in April next year. The purpose of this study was to make a case analysis of demonstrations during multilateral international conferences hosted by foreign countries over ten years between 1999 and 2009, to examine the controversial points over the demonstrations, and ultimately to seek ways of ensuring safety against possible assemblies and demonstrations during the forthcoming nuclear security summit, which is scheduled to be held in April next year. The findings of the study on feasible security measures are as follows: First, information and intelligence gathering should be reinforced, and the inspection should be stepped up. Second, pacification among domestic NGOs and the supplementation of the existing legal devices are required. Third, publicity should be strengthened. Fourth, riot police officers should be selected as early as possible to bolster their education and training, and more reinforced emergency measures should be taken. It's needed to seek assistance from the military as one of emergency measures, and national defense readiness should be bolstered across the nation in collaboration with the Ministry of National Defense when the summit is near at hand. Finally, CBR countermeasures should be taken in preparation for CBR terrorism.

  • PDF

Design of detection method for malicious URL based on Deep Neural Network (뉴럴네트워크 기반에 악성 URL 탐지방법 설계)

  • Kwon, Hyun;Park, Sangjun;Kim, Yongchul
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.5
    • /
    • pp.30-37
    • /
    • 2021
  • Various devices are connected to the Internet, and attacks using the Internet are occurring. Among such attacks, there are attacks that use malicious URLs to make users access to wrong phishing sites or distribute malicious viruses. Therefore, how to detect such malicious URL attacks is one of the important security issues. Among recent deep learning technologies, neural networks are showing good performance in image recognition, speech recognition, and pattern recognition. This neural network can be applied to research that analyzes and detects patterns of malicious URL characteristics. In this paper, performance analysis according to various parameters was performed on a method of detecting malicious URLs using neural networks. In this paper, malicious URL detection performance was analyzed while changing the activation function, learning rate, and neural network structure. The experimental data was crawled by Alexa top 1 million and Whois to build the data, and the machine learning library used TensorFlow. As a result of the experiment, when the number of layers is 4, the learning rate is 0.005, and the number of nodes in each layer is 100, the accuracy of 97.8% and the f1 score of 92.94% are obtained.